default search action
Lalit Kumar Awasthi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j78]Sahul Goyal, Lalit Kumar Awasthi:
An energy-efficient black widow-based adaptive VM placement approach for cloud computing. Clust. Comput. 27(4): 4659-4672 (2024) - [j77]Rohit Singh, Krishna Pal Sharma, Lalit Kumar Awasthi:
A machine learning-based ensemble model for securing the IoT network. Clust. Comput. 27(8): 10883-10897 (2024) - [j76]Himanshu Verma, Naveen Chauhan, Lalit Kumar Awasthi:
Enhanced Hybrid Congestion Mitigation Strategy for '6LoWPAN-RPL based patient-centric IoHT'. Comput. Networks 255: 110862 (2024) - [j75]Abhishek Hazra, Ambigavathi Munusamy, Mainak Adhikari, Lalit Kumar Awasthi, Venu P:
6G-Enabled Ultra-Reliable Low Latency Communication for Industry 5.0: Challenges and Future Directions. IEEE Commun. Stand. Mag. 8(2): 36-42 (2024) - [j74]Pankaj Sharma, Lalit Kumar Awasthi:
Unveiling the hidden dangers: Security risks and forensic analysis of smart bulbs. Forensic Sci. Int. Digit. Investig. 50: 301794 (2024) - [j73]Raj Mohan Singh, Geeta Sikka, Lalit Kumar Awasthi:
Energy Conscious Squirrel Search based Task Scheduling Mechanism in Fog Environment. Trans. Emerg. Telecommun. Technol. 35(10) (2024) - [j72]Shamal Kashid, Lalit Kumar Awasthi, Krishan Berwal, Parul Saini:
Spatiotemporal Feature Fusion for Video Summarization. IEEE Multim. 31(3): 88-97 (2024) - [j71]Sandeep Chand Kumain, Maheep Singh, Lalit Kumar Awasthi:
A voting-based novel spatio-temporal fusion framework for video saliency using transfer learning mechanism. Int. J. Multim. Inf. Retr. 13(1): 13 (2024) - [j70]Sandeep Chand Kumain, Maheep Singh, Lalit Kumar Awasthi:
DBTSF-VSOD: a decision-based two-stage framework for video salient object detection. Int. J. Multim. Inf. Retr. 13(4): 38 (2024) - [j69]Pankaj Sharma, Lalit Kumar Awasthi:
IoT forensics in ambient intelligence environments: Legal issues, research challenges and future directions. J. Ambient Intell. Smart Environ. 16(1): 73-110 (2024) - [j68]Neha Bansal, Shelly Sachdeva, Lalit Kumar Awasthi:
Query-based denormalization using hypergraph (QBDNH): a schema transformation model for migrating relational to NoSQL databases. Knowl. Inf. Syst. 66(1): 681-722 (2024) - [j67]Neha Agarwal, Geeta Sikka, Lalit Kumar Awasthi:
Integrating semantic similarity with Dirichlet multinomial mixture model for enhanced web service clustering. Knowl. Inf. Syst. 66(4): 2327-2353 (2024) - [j66]Ishana Attri, Lalit Kumar Awasthi, Teek Parval Sharma:
Machine learning in agriculture: a review of crop management applications. Multim. Tools Appl. 83(5): 12875-12915 (2024) - [j65]Sandeep Chand Kumain, Maheep Singh, Lalit Kumar Awasthi:
A dual-stream encoder-decoder network with attention mechanism for saliency detection in video(s). Signal Image Video Process. 18(3): 2037-2046 (2024) - [j64]Raj Mohan Singh, Geeta Sikka, Lalit Kumar Awasthi:
LBATSM: Load Balancing Aware Task Selection and Migration Approach in Fog Computing Environment. IEEE Syst. J. 18(2): 796-804 (2024) - [j63]Vishnu Kumar Prajapati, Teek Parval Sharma, Lalit Kumar Awasthi:
Data Dissemination Framework for Optimizing Overhead in IoT-Enabled Systems Using Tabu-RPL. SN Comput. Sci. 5(4): 343 (2024) - [j62]Urvashi Bansal, Geeta Sikka, Lalit Kumar Awasthi, Bharat K. Bhargava:
Quantitative Evaluation of Extensive Vulnerability Set Using Cost Benefit Analysis. IEEE Trans. Dependable Secur. Comput. 21(1): 298-308 (2024) - [j61]Neha Bansal, Shelly Sachdeva, Lalit Kumar Awasthi:
Schema generation for document stores using workload-driven approach. J. Supercomput. 80(3): 4000-4048 (2024) - [j60]Pushpendra Kumar Gupta, Akshay Verma, Prateek Gupta, Vaibhav Pachaulee, Mayank Trehan, Manoj Kumar, Lalit Kumar Awasthi:
Balanced Grouping Scheme for Efficient Clustering in WSN with Multilevel Heterogeneity. Wirel. Pers. Commun. 135(3): 1539-1560 (2024) - 2023
- [j59]Himanshu Verma, Naveen Chauhan, Lalit Kumar Awasthi:
A Comprehensive review of 'Internet of Healthcare Things': Networking aspects, technologies, services, applications, challenges, and security concerns. Comput. Sci. Rev. 50: 100591 (2023) - [j58]Raj Mohan Singh, Lalit Kumar Awasthi, Geeta Sikka:
Towards Metaheuristic Scheduling Techniques in Cloud and Fog: An Extensive Taxonomic Review. ACM Comput. Surv. 55(3): 50:1-50:43 (2023) - [j57]Pranjal Kumar, Siddhartha Chauhan, Lalit Kumar Awasthi:
Artificial Intelligence in Healthcare: Review, Ethics, Trust Challenges & Future Research Directions. Eng. Appl. Artif. Intell. 120: 105894 (2023) - [j56]Ishana Attri, Lalit Kumar Awasthi, Teek Parval Sharma, Priyanka Rathee:
A review of deep learning techniques used in agriculture. Ecol. Informatics 77: 102217 (2023) - [j55]Shailza Kanwar, Lalit Kumar Awasthi, Vivek Shrivastava:
Candidate project selection in cross project defect prediction using hybrid method. Expert Syst. Appl. 218: 119625 (2023) - [j54]Neha Agarwal, Geeta Sikka, Lalit Kumar Awasthi:
WGSDMM+GA: A genetic algorithm-based service clustering methodology assimilating dirichlet multinomial mixture model with word embedding. Future Gener. Comput. Syst. 145: 254-266 (2023) - [j53]Pankaj Sharma, Lalit Kumar Awasthi:
Next-generation forensic investigation framework for smart refrigerators: acquiring and analysing digital traces in IoT embedded devices. Int. J. Embed. Syst. 16(4): 255-275 (2023) - [j52]Monika Chaudhary, Nitin Goyal, Abderrahim Benslimane, Lalit Kumar Awasthi, Ayed Alwadain, Aman Singh:
Underwater Wireless Sensor Networks: Enabling Technologies for Node Deployment and Data Collection Challenges. IEEE Internet Things J. 10(4): 3500-3524 (2023) - [j51]Sarfaraj Alam Ansari, Kunwar Pal, Prajjval Govil, Mahesh Chandra Govil, Lalit Kumar Awasthi:
A statistical analysis of SAMPARK dataset for peer-to-peer traffic and selfish-peer identification. Multim. Tools Appl. 82(6): 8507-8535 (2023) - [j50]Himanshu Verma, Naveen Chauhan, Lalit Kumar Awasthi:
Modelling Buffer-Overflow in 6LoWPAN-Based Resource-Constraint IoT-Healthcare Network. Wirel. Pers. Commun. 129(2): 1113-1128 (2023) - [c20]Neha Bansal, Shelly Sachdeva, Lalit Kumar Awasthi:
A workload-driven approach for automatic schema generation for document stores. COMAD/CODS 2023: 133 - [c19]Kamini Sahu, Lalit Kumar Awasthi, Abhimanyu Kumar:
Key Generation using Pseudorandom Number Generator. ICCCNT 2023: 1-6 - 2022
- [j49]Nitin Goyal, Ashok Kumar, Renu Popli, Lalit Kumar Awasthi, Nonita Sharma, Gaurav Sharma:
Priority based data gathering using multiple mobile sinks in cluster based UWSNs for oil pipeline leakage detection. Clust. Comput. 25(2): 1341-1354 (2022) - [j48]Anita Choudhary, Mahesh Chandra Govil, Girdhari Singh, Lalit Kumar Awasthi, Emmanuel S. Pilli:
Energy-aware scientific workflow scheduling in cloud environment. Clust. Comput. 25(6): 3845-3874 (2022) - [j47]Abhilasha Sharma, Lalit Kumar Awasthi:
Ob-EID: Obstacle aware event information dissemination for SDN enabled vehicular network. Comput. Networks 216: 109257 (2022) - [j46]Himanshu Verma, Naveen Chauhan, Narottam Chand, Lalit Kumar Awasthi:
Buffer-loss estimation to address congestion in 6LoWPAN based resource-restricted 'Internet of Healthcare Things' network. Comput. Commun. 181: 236-256 (2022) - [j45]Neha Agarwal, Geeta Sikka, Lalit Kumar Awasthi:
A systematic literature review on web service clustering approaches to enhance service discovery, selection and recommendation. Comput. Sci. Rev. 45: 100498 (2022) - [j44]Nishant Sharma, Naveen Chauhan, Narottam Chand, Lalit Kumar Awasthi:
Secure authentication and session key management scheme for Internet of Vehicles. Trans. Emerg. Telecommun. Technol. 33(5) (2022) - [j43]Mamta Nain, Nitin Goyal, Lalit Kumar Awasthi, Amita Malik:
A range based node localization scheme with hybrid optimization for underwater wireless sensor network. Int. J. Commun. Syst. 35(10) (2022) - [j42]Pranjal Kumar, Siddhartha Chauhan, Lalit Kumar Awasthi:
Human pose estimation using deep learning: review, methodologies, progress and future research directions. Int. J. Multim. Inf. Retr. 11(4): 489-521 (2022) - [j41]Samayveer Singh, Aridaman Singh Nandan, Aruna Malik, Rajeev Kumar, Lalit Kumar Awasthi, Neeraj Kumar:
A GA-Based Sustainable and Secure Green Data Communication Method Using IoT-Enabled WSN in Healthcare. IEEE Internet Things J. 9(10): 7481-7490 (2022) - [c18]Neha Bansal, Shelly Sachdeva, Lalit Kumar Awasthi:
Database Migration Tools: From RDB to NoSQL Database. SoMeT 2022: 563-570 - 2021
- [j40]Aridaman Singh Nandan, Samayveer Singh, Lalit Kumar Awasthi:
An efficient cluster head election based on optimized genetic algorithm for movable sinks in IoT enabled HWSNs. Appl. Soft Comput. 107: 107318 (2021) - [j39]Abhilasha Sharma, Lalit Kumar Awasthi:
Pr-CAI: Priority based-Context Aware Information scheduling for SDN-based vehicular network. Comput. Networks 193: 108097 (2021) - [j38]Amit Nayyer, Aman Kumar Sharma, Lalit Kumar Awasthi:
Learning-based hybrid routing for scalability in software defined networks. Comput. Networks 198: 108362 (2021) - [j37]Urvashi Garg, Geeta Sikka, Lalit Kumar Awasthi:
An ensemble approach for optimization of penetration layout in wide area networks. Comput. Commun. 174: 61-74 (2021) - [j36]Satnam Kaur, Lalit Kumar Awasthi, Amrit Lal Sangal:
HMOSHSSA: a hybrid meta-heuristic approach for solving constrained optimization problems. Eng. Comput. 37(4): 3167-3203 (2021) - [j35]Urvashi Garg, Geeta Sikka, Lalit Kumar Awasthi:
Empirical risk assessment of attack graphs using time to compromise framework. Int. J. Inf. Comput. Secur. 16(1/2): 33-50 (2021) - [j34]Amit Nayyer, Aman Kumar Sharma, Lalit Kumar Awasthi:
Unified model towards Scalability in Software Defined Networks. Int. J. Next Gener. Comput. 12(1) (2021) - [c17]Neha Agarwal, Geeta Sikka, Lalit Kumar Awasthi:
Comparative Study of Topic Modeling and Word Embedding Approaches for Web Service Clustering. IC3 2021: 309-313 - 2020
- [j33]Abhilasha Sharma, Lalit Kumar Awasthi:
AdPS: Adaptive Priority Scheduling for Data Services in Heterogeneous Vehicular Networks. Comput. Commun. 159: 71-82 (2020) - [j32]Satnam Kaur, Lalit Kumar Awasthi, Amrit Lal Sangal, Gaurav Dhiman:
Tunicate Swarm Algorithm: A new bio-inspired based metaheuristic paradigm for global optimization. Eng. Appl. Artif. Intell. 90: 103541 (2020) - [j31]Neha Agarwal, Geeta Sikka, Lalit Kumar Awasthi:
Enhancing web service clustering using Length Feature Weight Method for service description document vector space representation. Expert Syst. Appl. 161: 113682 (2020) - [j30]Neha Agarwal, Geeta Sikka, Lalit Kumar Awasthi:
Evaluation of web service clustering using Dirichlet Multinomial Mixture model based approach for Dimensionality Reduction in service representation. Inf. Process. Manag. 57(4): 102238 (2020)
2010 – 2019
- 2019
- [j29]Amit Nayyer, Aman Kumar Sharma, Lalit Kumar Awasthi:
Laman: A supervisor controller based scalable framework for software defined networks. Comput. Networks 159: 125-134 (2019) - [j28]Anita Choudhary, Mahesh Chandra Govil, Girdhari Singh, Lalit Kumar Awasthi, Emmanuel S. Pilli:
Energy-efficient fuzzy-based approach for dynamic virtual machine consolidation. Int. J. Grid Util. Comput. 10(4): 308-325 (2019) - 2018
- [j27]Urvashi Garg, Geeta Sikka, Lalit Kumar Awasthi:
Empirical analysis of attack graphs for mitigating critical paths and vulnerabilities. Comput. Secur. 77: 349-359 (2018) - [j26]Prashant Kumar, Naveen Chauhan, Narottam Chand, Lalit Kumar Awasthi:
SF-APP: A Secure Framework for Authentication and Privacy Preservation in Opportunistic Networks. Int. J. Web Serv. Res. 15(2): 47-66 (2018) - [c16]Anita Choudhary, Mahesh Chandra Govil, Girdhari Singh, Lalit Kumar Awasthi, Emmanuel S. Pilli:
Task Clustering-Based Energy-Aware Workflow Scheduling in Cloud Environment. HPCC/SmartCity/DSS 2018: 968-973 - 2017
- [j25]Anita Choudhary, Mahesh Chandra Govil, Girdhari Singh, Lalit Kumar Awasthi, Emmanuel S. Pilli, Divya Kapil:
A critical survey of live virtual machine migration techniques. J. Cloud Comput. 6: 23 (2017) - [j24]Brij Bihari Dubey, Naveen Chauhan, Narottam Chand, Lalit Kumar Awasthi:
Incentive based scheme for improving data availability in vehicular ad-hoc networks. Wirel. Networks 23(6): 1669-1687 (2017) - 2016
- [j23]Rajesh Sharma, Lalit Kumar Awasthi, Naveen Chauhan:
Minimal Marking of Trap-Regions for Efficient Greedy Forwarding in WSNs. Int. J. Next Gener. Comput. 7(1) (2016) - [j22]Rajesh Sharma, Lalit Kumar Awasthi, Naveen Chauhan:
GRAB: Greedy Forwarding with Routing Along Boundaries in Wireless Sensor Networks. Int. J. Next Gener. Comput. 7(3) (2016) - [j21]Brij Bihari Dubey, Naveen Chauhan, Narottam Chand, Lalit Kumar Awasthi:
Priority based efficient data scheduling technique for VANETs. Wirel. Networks 22(5): 1641-1657 (2016) - 2015
- [j20]Jawahar Thakur, Arvind Kalia, Lalit Kumar Awasthi:
Checkpointing and Roll back Recovery Protocols in Wireless Ad hoc Networks: A Review. Int. J. Next Gener. Comput. 6(2) (2015) - [j19]Brij Bihari Dubey, Naveen Chauhan, Narottam Chand, Lalit Kumar Awasthi:
Analyzing and reducing impact of dynamic obstacles in vehicular ad-hoc networks. Wirel. Networks 21(5): 1631-1645 (2015) - 2014
- [j18]Prashant Kumar, Naveen Chauhan, Lalit Kumar Awasthi, Narottam Chand:
Cooperative Cache Replacement Policy for MANETs. Int. J. Adv. Pervasive Ubiquitous Comput. 6(2): 36-47 (2014) - [j17]Siddhartha Chauhan, Lalit Kumar Awasthi:
An energy efficient cycle stealing algorithm for best effort services in wireless sensor networks. Int. J. Commun. Networks Distributed Syst. 12(3): 275-298 (2014) - [j16]Lalit Kumar Awasthi, Manoj Misra, Ramesh Chandra Joshi:
Minimum mutable checkpoint-based coordinated checkpointing protocol for mobile distributed systems. Int. J. Commun. Networks Distributed Syst. 12(4): 356-380 (2014) - 2013
- [j15]Ankur Gupta, Lalit Kumar Awasthi:
Peer enterprises: design and implementation of a cross-organisational peer-to-peer framework. Int. J. Commun. Networks Distributed Syst. 11(4): 347-375 (2013) - [c15]Ashok Kumar Nanda, Lalit Kumar Awasthi:
A Proposal for SMS Security Using NTRU Cryptosystem. QSHINE 2013: 706-718 - 2012
- [j14]Naveen Chauhan, Lalit Kumar Awasthi, Narottam Chand:
Cache Replacement in Mobile Adhoc Networks. Int. J. Distributed Syst. Technol. 3(2): 22-38 (2012) - [j13]Ajay Guleria, Narottam Chand Kaushal, Lalit Kumar Awasthi:
Integrated Push Pull Algorithm with Accomplishment Assurance in VANETs. Int. J. Next Gener. Comput. 3(3) (2012) - 2011
- [j12]Ankur Gupta, Lalit Kumar Awasthi:
Peer-to-Peer Networks and Computation: Current Trends and Future Perspectives. Comput. Informatics 30(3): 559-594 (2011) - [j11]Ankur Gupta, Lalit Kumar Awasthi:
Peers-for-peers (P4P): an efficient and reliable fault-tolerance strategy for cycle-stealing P2P applications. Int. J. Commun. Networks Distributed Syst. 6(2): 202-228 (2011) - [j10]Naveen Chauhan, Lalit Kumar Awasthi, Narottam Chand, Ramesh Chandra Joshi, Manoj Misra:
Cooperative Caching in Mobile Ad Hoc Networks. Int. J. Mob. Comput. Multim. Commun. 3(3): 20-35 (2011) - [j9]Prashant Kumar, Naveen Chauhan, Lalit Kumar Awasthi, Narottam Chand:
Enhancing Data Availability in MANETs with Cooperative Caching. Int. J. Mob. Comput. Multim. Commun. 3(4): 53-66 (2011) - [j8]Manju Bala, Lalit Kumar Awasthi:
Performance Tradeoff with Routing Protocols for Radio Models in Wireless Sensor Networks. Wirel. Eng. Technol. 2(2): 53-59 (2011) - [j7]Naveen Chauhan, Lalit Kumar Awasthi, Narottam Chand, Vivek Katiyar, Ankit Chugh:
A Distributed Weighted Cluster Based Routing Protocol for MANETs. Wirel. Sens. Netw. 3(2): 54-60 (2011) - [c14]Anurag Singh, Narottam Chand, Lalit Kumar Awasthi:
Cache Invalidation for Location Dependent and Independent Data in IVANETS. ACC (3) 2011: 609-614 - [c13]Lakshmi Priya M., Lalit Kumar Awasthi:
Distributed Localization for Anisotropic Sensor Networks Using Spatial Clustering. ADCONS 2011: 375-380 - [c12]Naveen Chauhan, Lalit Kumar Awasthi, Narottam Chand:
Data Mining Techniques for Prefetching in Mobile Ad Hoc Networks. HPAGC 2011: 594-602 - [c11]Sudhanshu Pant, Naveen Chauhan, Narottam Chand, Lalit Kumar Awasthi, Brij Bihari Dubey:
Improving Fading-Aware Routing with Circular Cache Layers in Wireless Sensor Networks. IC3 2011: 395-402 - [c10]Brij Bihari Dubey, Naveen Chauhan, Lalit Kumar Awasthi, Narottam Chand, Sudhanshu Pant:
Efficient VANET-Based Traffic Information Dissemination Using Centralized Fixed Infrastructure. IC3 2011: 415-425 - [c9]Naveen Chauhan, Lalit Kumar Awasthi, Narottam Chand, Ramesh Chandra Joshi, Manoj Misra:
A cooperative caching strategy in mobile ad hoc networks based on clusters. ICCCS 2011: 17-20 - [c8]Brij Bihari Dubey, Naveen Chauhan, Lalit Kumar Awasthi:
NILDD: nearest intersection location dependent dissemination of traffic information in VANETs. ICCCS 2011: 96-99 - 2010
- [j6]Lalit Kumar Awasthi, Manoj Misra, Ramesh C. Joshi:
A weighted checkpointing protocol for mobile distributed systems. Int. J. Ad Hoc Ubiquitous Comput. 5(3): 137-149 (2010) - [j5]Ankur Gupta, Lalit Kumar Awasthi:
PArch: a cross-organisational peer-to-peer framework supporting the aggregation and exchange of storage for efficient e-mail archival. Int. J. Bus. Inf. Syst. 5(1): 102-116 (2010) - [j4]Ankur Gupta, Lalit Kumar Awasthi:
Toward a Quality-of-Service Framework for Peer-to-Peer Applications. Int. J. Distributed Syst. Technol. 1(3): 1-23 (2010) - [j3]Ankur Gupta, Lalit Kumar Awasthi:
IndNet: towards a peer-to-peer community network that connects the information technology industry and academia in India. Int. J. Netw. Virtual Organisations 7(1): 63-79 (2010) - [j2]Ankur Gupta, Lalit Kumar Awasthi:
A Containment-Based Security Model for Cycle-Stealing P2P Applications. Inf. Secur. J. A Glob. Perspect. 19(4): 191-203 (2010) - [i1]Manju Sharma, Lalit Kumar Awasthi:
Realistic Approach towards Quantitative Analysis and Simulation of EEHC-Based Routing for Wireless Sensor Networks. CoRR abs/1002.1151 (2010)
2000 – 2009
- 2009
- [c7]Pamita Awasthi, Shilpa Dogra, Lalit Kumar Awasthi, Ritu Barthwal:
Interactions of Mitoxantrone and its Analogues with DNA Tetramer Sequences- A Molecular Modeling Study. BIOCOMP 2009: 121-128 - [c6]Ankur Gupta, Lalit Kumar Awasthi:
Security Issues in Cross-Organizational Peer-to-Peer Applications and Some Solutions. IC3 2009: 422-433 - 2008
- [c5]Ankur Gupta, Lalit Kumar Awasthi:
Secure Thyself: Securing Individual Peers in Collaborative Peer-to-Peer Environments. GCA 2008: 140-146 - [c4]Khushboo Agarwal, Lalit Kumar Awasthi:
Enhanced AODV routing protocol for Ad hoc networks. ICON 2008: 1-5 - [c3]Ankur Gupta, Deepti Malhotra, Lalit Kumar Awasthi:
NeighborTrust: A trust-based scheme for countering Distributed Denial-of-Service attacks in P2P networks. ICON 2008: 1-6 - 2007
- [j1]Lalit Kumar Awasthi, Prashant Kumar:
A synchronous checkpointing protocol for mobile distributed systems: probabilistic approach. Int. J. Inf. Comput. Secur. 1(3): 298-314 (2007) - [c2]Ankur Gupta, Lalit Kumar Awasthi:
P4P: Ensuring Fault-Tolerance for Cycle-Stealing P2P applications. GCA 2007: 151-158 - [c1]Ankur Gupta, Lalit Kumar Awasthi:
Peer Enterprises: Possibilities, Challenges and Some Ideas Towards Their Realization. OTM Workshops (2) 2007: 1011-1020
Coauthor Index
aka: Narottam Chand Kaushal
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint